Skip to content

Commit 5a0f250

Browse files
Merge branch 'main' of github.com:MicrosoftDocs/azure-docs-pr
2 parents a887b55 + c1d72d8 commit 5a0f250

File tree

137 files changed

+3434
-2121
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

137 files changed

+3434
-2121
lines changed

.openpublishing.publish.config.json

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -955,6 +955,12 @@
955955
"url": "https://github.com/Azure-Samples/cosmos-db-mongodb-api-dotnet-samples",
956956
"branch": "main",
957957
"branch_mapping": {}
958+
},
959+
{
960+
"path_to_root": "reusable-content",
961+
"url": "https://github.com/MicrosoftDocs/reusable-content",
962+
"branch": "main",
963+
"branch_mapping": {}
958964
}
959965
],
960966
"branch_target_mapping": {

.openpublishing.redirection.json

Lines changed: 35 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -6223,6 +6223,41 @@
62236223
"redirect_url": "/azure/azure-cache-for-redis/scripts/create-manage-cache",
62246224
"redirect_document_id": false
62256225
},
6226+
{
6227+
"source_path_from_root": "/articles/storage/common/storage-auth-abac-attributes.md",
6228+
"redirect_url": "/azure/storage/blobs/storage-auth-abac-attributes",
6229+
"redirect_document_id": false
6230+
},
6231+
{
6232+
"source_path_from_root": "/articles/storage/common/storage-auth-abac-cli.md",
6233+
"redirect_url": "/azure/storage/blobs/storage-auth-abac-cli",
6234+
"redirect_document_id": false
6235+
},
6236+
{
6237+
"source_path_from_root": "/articles/storage/common/storage-auth-abac-examples.md",
6238+
"redirect_url": "/azure/storage/blobs/storage-auth-abac-examples",
6239+
"redirect_document_id": false
6240+
},
6241+
{
6242+
"source_path_from_root": "/articles/storage/common/storage-auth-abac-portal.md",
6243+
"redirect_url": "/azure/storage/blobs/storage-auth-abac-portal",
6244+
"redirect_document_id": false
6245+
},
6246+
{
6247+
"source_path_from_root": "/articles/storage/common/storage-auth-abac-powershell.md",
6248+
"redirect_url": "/azure/storage/blobs/storage-auth-abac-powershell",
6249+
"redirect_document_id": false
6250+
},
6251+
{
6252+
"source_path_from_root": "/articles/storage/common/storage-auth-abac-security.md",
6253+
"redirect_url": "/azure/storage/blobs/storage-auth-abac-security",
6254+
"redirect_document_id": false
6255+
},
6256+
{
6257+
"source_path_from_root": "/articles/storage/common/storage-auth-abac.md",
6258+
"redirect_url": "/azure/storage/blobs/storage-auth-abac",
6259+
"redirect_document_id": false
6260+
},
62266261
{
62276262
"source_path_from_root": "/articles/storage/storage-client-side-encryption.md",
62286263
"redirect_url": "/azure/storage/common/storage-client-side-encryption",

articles/active-directory/authentication/concept-registration-mfa-sspr-combined.md

Lines changed: 7 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -59,14 +59,16 @@ Combined registration supports the authentication methods and actions in the fol
5959
| Hardware token | No | No | Yes |
6060
| Phone | Yes | Yes | Yes |
6161
| Alternate phone | Yes | Yes | Yes |
62-
| Office phone | Yes | Yes | Yes |
62+
| Office phone* | Yes | Yes | Yes |
6363
| Email | Yes | Yes | Yes |
6464
| Security questions | Yes | No | Yes |
65-
| App passwords | Yes | No | Yes |
66-
| FIDO2 security keys<br />*Managed mode only from the [Security info](https://mysignins.microsoft.com/security-info) page*| Yes | Yes | Yes |
65+
| App passwords* | Yes | No | Yes |
66+
| FIDO2 security keys*| Yes | Yes | Yes |
6767

6868
> [!NOTE]
69-
> App passwords are available only to users who have been enforced for Azure AD Multi-Factor Authentication. App passwords are not available to users who are enabled for Azure AD Multi-Factor Authentication by a Conditional Access policy.
69+
> <b>Office phone</b> can only be registered in *Interrupt mode* if the users *Business phone* property has been set. Office phone can be added by users in *Managed mode from the [Security info](https://mysignins.microsoft.com/security-info)* without this requirement. <br />
70+
> <b>App passwords</b> are available only to users who have been enforced for Azure AD Multi-Factor Authentication. App passwords are not available to users who are enabled for Azure AD Multi-Factor Authentication by a Conditional Access policy. <br />
71+
> <b>FIDO2 security keys</b>, can only be added in *Managed mode only from the [Security info](https://mysignins.microsoft.com/security-info) page*
7072
7173
Users can set one of the following options as the default multifactor authentication method.
7274

@@ -140,7 +142,7 @@ A user who hasn't yet set up all required security info goes to [https://myaccou
140142

141143
### Set up other methods after partial registration
142144

143-
If a user has partially satisfied MFA or SSPR registration due to existing authentication method registrations performed by the user or admin, users will only be asked to register additional information allowed by the Authentication methods policy. If more than one other authentication method is available for the user to choose and register, an option on the registration experience titled **I want to set up another method** will be shown and allow the user to set up their desired authentication method.
145+
If a user has partially satisfied MFA or SSPR registration due to existing authentication method registrations performed by the user or admin, users will only be asked to register additional information allowed by the Authentication methods policy settings when registration is required. If more than one other authentication method is available for the user to choose and register, an option on the registration experience titled **I want to set up another method** will be shown and allow the user to set up their desired authentication method.
144146

145147
:::image type="content" border="true" source="./media/concept-registration-mfa-sspr-combined/other-method.png" alt-text="Screenshot of how to set up another method." :::
146148

articles/active-directory/enterprise-users/users-restrict-guest-permissions.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -145,6 +145,7 @@ Service without current support might have compatibility issues with the new gue
145145
- Forms
146146
- Project
147147
- Yammer
148+
- Planner in SharePoint
148149

149150
## Frequently asked questions (FAQ)
150151

articles/active-directory/hybrid/choose-ad-authn.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -67,7 +67,6 @@ Details on decision questions:
6767
2. Azure AD can hand off user sign-in to a trusted authentication provider such as Microsoft’s AD FS.
6868
3. If you need to apply, user-level Active Directory security policies such as account expired, disabled account, password expired, account locked out, and sign-in hours on each user sign-in, Azure AD requires some on-premises components.
6969
4. Sign-in features not natively supported by Azure AD:
70-
* Sign-in using smartcards or certificates.
7170
* Sign-in using on-premises MFA Server.
7271
* Sign-in using third-party authentication solution.
7372
* Multi-site on-premises authentication solution.
@@ -175,7 +174,7 @@ The following diagrams outline the high-level architecture components required f
175174
|Is there a health monitoring solution?|Not required|Agent status provided by [Azure Active Directory admin center](../../active-directory/hybrid/tshoot-connect-pass-through-authentication.md)|[Azure AD Connect Health](../../active-directory/hybrid/how-to-connect-health-adfs.md)|
176175
|Do users get single sign-on to cloud resources from domain-joined devices within the company network?|Yes with [Seamless SSO](../../active-directory/hybrid/how-to-connect-sso.md)|Yes with [Seamless SSO](../../active-directory/hybrid/how-to-connect-sso.md)|Yes|
177176
|What sign-in types are supported?|UserPrincipalName + password<br><br>Windows-Integrated Authentication by using [Seamless SSO](../../active-directory/hybrid/how-to-connect-sso.md)<br><br>[Alternate login ID](../../active-directory/hybrid/how-to-connect-install-custom.md)|UserPrincipalName + password<br><br>Windows-Integrated Authentication by using [Seamless SSO](../../active-directory/hybrid/how-to-connect-sso.md)<br><br>[Alternate login ID](../../active-directory/hybrid/how-to-connect-pta-faq.yml)|UserPrincipalName + password<br><br>sAMAccountName + password<br><br>Windows-Integrated Authentication<br><br>[Certificate and smart card authentication](/windows-server/identity/ad-fs/operations/configure-user-certificate-authentication)<br><br>[Alternate login ID](/windows-server/identity/ad-fs/operations/configuring-alternate-login-id)|
178-
|Is Windows Hello for Business supported?|[Key trust model](/windows/security/identity-protection/hello-for-business/hello-identity-verification)|[Key trust model](/windows/security/identity-protection/hello-for-business/hello-identity-verification)<br>*Requires Windows Server 2016 Domain functional level*|[Key trust model](/windows/security/identity-protection/hello-for-business/hello-identity-verification)<br><br>[Certificate trust model](/windows/security/identity-protection/hello-for-business/hello-key-trust-adfs)|
177+
|Is Windows Hello for Business supported?|[Key trust model](/windows/security/identity-protection/hello-for-business/hello-identity-verification)<br><br>[Hybrid Cloud Trust](/windows/security/identity-protection/hello-for-business/hello-hybrid-cloud-trust)|[Key trust model](/windows/security/identity-protection/hello-for-business/hello-identity-verification)<br><br>[Hybrid Cloud Trust](/windows/security/identity-protection/hello-for-business/hello-hybrid-cloud-trust)<br><br>*Both require Windows Server 2016 Domain functional level*|[Key trust model](/windows/security/identity-protection/hello-for-business/hello-identity-verification)<br><br>[Hybrid Cloud Trust](/windows/security/identity-protection/hello-for-business/hello-hybrid-cloud-trust)<br><br>[Certificate trust model](/windows/security/identity-protection/hello-for-business/hello-key-trust-adfs)|
179178
|What are the multifactor authentication options?|[Azure AD MFA](/azure/multi-factor-authentication/)<br><br>[Custom Controls with Conditional Access*](../../active-directory/conditional-access/controls.md)|[Azure AD MFA](/azure/multi-factor-authentication/)<br><br>[Custom Controls with Conditional Access*](../../active-directory/conditional-access/controls.md)|[Azure AD MFA](/azure/multi-factor-authentication/)<br><br>[Azure MFA server](../../active-directory/authentication/howto-mfaserver-deploy.md)<br><br>[Third-party MFA](/windows-server/identity/ad-fs/operations/configure-additional-authentication-methods-for-ad-fs)<br><br>[Custom Controls with Conditional Access*](../../active-directory/conditional-access/controls.md)|
180179
|What user account states are supported?|Disabled accounts<br>(up to 30-minute delay)|Disabled accounts<br><br>Account locked out<br><br>Account expired<br><br>Password expired<br><br>Sign-in hours|Disabled accounts<br><br>Account locked out<br><br>Account expired<br><br>Password expired<br><br>Sign-in hours|
181180
|What are the Conditional Access options?|[Azure AD Conditional Access, with Azure AD Premium](../../active-directory/conditional-access/overview.md)|[Azure AD Conditional Access, with Azure AD Premium](../../active-directory/conditional-access/overview.md)|[Azure AD Conditional Access, with Azure AD Premium](../../active-directory/conditional-access/overview.md)<br><br>[AD FS claim rules](https://adfshelp.microsoft.com/AadTrustClaims/ClaimsGenerator)|

articles/active-directory/hybrid/how-to-connect-group-writeback-v2.md

Lines changed: 8 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -123,10 +123,14 @@ Microsoft provides support for this public preview release, but it might not be
123123

124124
These limitations and known issues are specific to group writeback:
125125

126-
- Cloud [distribution list groups](/exchange/recipients-in-exchange-online/manage-distribution-groups/manage-distribution-groups) created in Exchange Online can't be written back to Active Directory. Only Microsoft 365 and Azure AD security groups are supported.
127-
- When you enable group writeback, all existing Microsoft 365 groups are written back and created as distribution groups by default. This behavior is for backward compatibility with the current version of group writeback. You can modify this behavior by following the steps in [Modify Azure AD Connect group writeback default behavior](how-to-connect-modify-group-writeback.md).
128-
- When you disable writeback for a group, the group won't automatically be removed from your on-premises Active Directory instance until you hard delete it in Azure AD. You can modify this behavior by following the steps in [Modify Azure AD Connect group writeback default behavior](how-to-connect-modify-group-writeback.md).
129-
- Group writeback does not support writeback of nested group members that have a scope of **Domain local** in Active Directory, because Azure AD security groups are written back with a scope of **Universal**. 
126+
- Cloud [distribution list groups](https://docs.microsoft.com/exchange/recipients-in-exchange-online/manage-distribution-groups/manage-distribution-groups) created in Exchange Online cannot be written back to AD, only Microsoft 365 and Azure AD security groups are supported.
127+
- To be backwards compatible with the current version of group writeback, when you enable group writeback, all existing Microsoft 365 groups are written back and created as distribution groups, by default.
128+
- When you disable writeback for a group, the group won't automatically be removed from your on-premises Active Directory, until hard deleted in Azure AD. This behavior can be modified by following the steps detailed in [Modifying group writeback](how-to-connect-modify-group-writeback.md)
129+
- Group Writeback does not support writeback of nested group members that have a scope of ‘Domain local’ in AD, since Azure AD security groups are written back with scope ‘Universal’. If you have a nested group like this, you'll see an export error in Azure AD Connect with the message “A universal group cannot have a local group as a member.” The resolution is to remove the member with scope ‘Domain local’ from the Azure AD group or update the nested group member scope in AD to ‘Global’ or ‘Universal’ group.
130+
- Group Writeback only supports writing back groups to a single Organization Unit (OU). Once the feature is enabled, you cannot change the OU you selected. A workaround is to disable group writeback entirely in Azure AD Connect and then select a different OU when you re-enable the feature. 
131+
- Nested cloud groups that are members of writeback enabled groups must also be enabled for writeback to remain nested in AD.
132+
- Group Writeback setting to manage new security group writeback at scale is not yet available. You will need to configure writeback for each group. 
133+
130134

131135
If you have a nested group like this, you'll see an export error in Azure AD Connect with the message "A universal group cannot have a local group as a member." The resolution is to remove the member with the **Domain local** scope from the Azure AD group, or update the nested group member scope in Active Directory to **Global** or **Universal**.
132136
- Group writeback supports writing back groups to only a single organizational unit (OU). After the feature is enabled, you can't change the OU that you selected. A workaround is to disable group writeback entirely in Azure AD Connect and then select a different OU when you re-enable the feature. 

0 commit comments

Comments
 (0)